UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

The application server must behave in a predictable and documented manner that reflects organizational and system objectives when invalid inputs are received.


Overview

Finding ID Version Rule ID IA Controls Severity
V-57565 SRG-APP-000447-AS-000273 SV-71841r2_rule Medium
Description
Invalid user input occurs when a user inserts data or characters into an applications data entry field and the application is unprepared to process that data. This results in unanticipated application behavior potentially leading to an application or information system compromise. Invalid user input is one of the primary methods employed when attempting to compromise an application. Application servers must ensure their management interfaces perform data input validation checks. When invalid data is entered, the application server must behave in a predictable and documented manner that reflects organizational and system objectives when invalid inputs are received. An example of a predictable behavior is trapping the data, logging the invalid data for forensic analysis if necessary, and continuing operation in a safe and secure manner.
STIG Date
Application Server Security Requirements Guide 2018-01-08

Details

Check Text ( C-58273r1_chk )
Review the application server configuration to determine if the management interface behaves in a predictable and documented manner that reflects organizational and system objectives when invalid inputs are received.

If the application server does not meet this requirement, this is a finding.
Fix Text (F-62633r1_fix)
Configure the application server management interface to behave in a predictable and documented manner that reflects organizational and system objectives when invalid inputs are received.